Looking for Ethical Hacking_LB31310644_80_242 test answers and solutions? Browse our comprehensive collection of verified answers for Ethical Hacking_LB31310644_80_242 at moodlelms.eelu.edu.eg.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Exploiting vulnerability is one of the hacking steps that may take place when
Hiding files to avoid detection, this is done during
Man in the middle attack happens when the attacker tricks the user to submit login details via email or message and redirect him/her to malicious site.
Unskilled hackers relying on pre-written scripts and tools developed by others
DNS amplification attack happens When an attacker tries to navigate out side root directory to access sensitive information in the system
Enumeration is the process done by attackers after gain a “shell” on the target system, to increase their knowledge
SQL injection is considered one of passive attacks
installed applications can be found by listing the files in /usr/bin/ and /sbin/
Increasing access rights to gain more control over the system, this refers to Escalating Privileges
Integrity Ensures that information is accessible only to those who are authorized to have access